CN101681436A - Communication management device, communication management method, and communication management program - Google Patents

Communication management device, communication management method, and communication management program Download PDF

Info

Publication number
CN101681436A
CN101681436A CN200880009014A CN200880009014A CN101681436A CN 101681436 A CN101681436 A CN 101681436A CN 200880009014 A CN200880009014 A CN 200880009014A CN 200880009014 A CN200880009014 A CN 200880009014A CN 101681436 A CN101681436 A CN 101681436A
Authority
CN
China
Prior art keywords
mentioned
card
function
locking
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200880009014A
Other languages
Chinese (zh)
Other versions
CN101681436B (en
Inventor
竹内望
藤原克章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Innovations Co ltd Hong Kong
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Publication of CN101681436A publication Critical patent/CN101681436A/en
Application granted granted Critical
Publication of CN101681436B publication Critical patent/CN101681436B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/354Card activation or deactivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Telephone Function (AREA)
  • Credit Cards Or The Like (AREA)
  • Lock And Its Accessories (AREA)

Abstract

To authenticate etc. an IC card upon execution of an IC locking function by utilizing a privacy function. A communication management device has an IC, an IC card lock setting part, and a main controlpart. The IC includes an IC card function part for providing various kinds of services and a privacy function setting part for storing information for controlling the services provided by the IC cardfunction part. The IC card lock setting part manages setting for locking the operation of the IC card function part. When locking managed by the IC card lock setting part is unlocked, the main controlpart forcibly stops the services provided by the IC card function part according to privacy information set by the privacy function setting part.

Description

Communications Management Units, communication management method and communication management program
Technical field
[0001]
The present invention relates to Communications Management Units, communication management method and communication management program that the communication of implementing in the noncontact mode is managed.
Background technology
[0002]
Recently, developed non-contact IC card technology (Felica (registered trademark) with nonvolatile memory and wireless communication chips; Referring to non-patent literature 1).In non-contact IC card technology, contactless ic is packed in various cards, and by this IC-card being covered on read/write (read/write) terminal reception/transmission data between realization and the read/write terminal.In addition, power supply as contactless IC card, owing to can use the electric power that electromagnetic wave produced that sends over based on the read/write terminal, therefore no longer comprise power supplys such as battery in its structure, can make simplifying the structure of IC-card like this, and battery can not occur and use up, for example, in payment in advance IC-card (Suica (registered trademark)), the credit card of paying by mails (Edy (registered trademark)), employee's card or the like, use with regard to out of use situation.
[0003]
Recently, carried out in radio Phone unit, being suitable for the trial of the function of contactless IC card.That is to say, in radio Phone unit,,, improved the importance of lock function as the countermeasure that prevents to leak these information owing to storing various information.Usually in radio Phone unit, the user is by button operation input password numbering, just is ready to the various lock functions that provided for it.The mail security setting etc. that this lock function can be used to the complete out of use whole lockings of function outside the restricted function such as the ON/OFF, urgent call transmission of power supply for example and can not show mail.
[0004]
In the lock function of above-mentioned radio Phone unit, can be suitable for the lock function that non-contact IC card has.The lock function that above-mentioned contactless IC card has can be realized by the power supply that disconnects the IC (Faver) that service that (OFF) be used for providing to non-contact IC card provide, and wherein this service for example provides the E-Payment service of Edy (registered trademark) etc.
[0005]
As the technology of removing above-mentioned lock function, for example, on the releasing picture of above-mentioned whole lockings and mail security setting, must input the operation of password numbering.In addition, as disclosed in the following patent documentation 1, after simple operations, login in advance has other the exterior I C card of FeliCa IDm on the cover, by the FeliCa IDm of cross-checked as the inherent data of said external IC-card, realizes the releasing of locking.Thus, if card is not at one's side, then can't therefore can prevent wrongful latch-release to sticking into capable latch-release, in addition, if be stuck at one's side, then on labour's this point of saving input password numbering, be function very easily.And, be used to carry out the authentication of above-mentioned latch-release, also can be used as the IC-card authentication function.
[0006]
Patent documentation 1: TOHKEMY 2004-54305 communique
The structure of the summary FeliCa of non-patent literature 1:FeliCa, [online], SONY Co., Ltd., [putting down into retrieval on February 16th, 19], the Internet<URL:http: //www.sony.co.jp/Products/felica/abt/dvs.html 〉
Summary of the invention
[0007]
But the authentication function of above-mentioned IC-card exists following inconvenience.Just, in the IC-card lock function, the power supply of IC (Faver) is in OFF (disconnection), can not reads the FeliCa IDm of exterior I C card, but in order to implement authentication, the power supply that just must make IC (Faver) is ON (connection).Yet, in case the power supply of IC (Faver) for connecting, the IC-card function will automatically enter can operated state, can't stop.For this reason, be under the situation of conducting at the power supply of IC, just exist the possibility that can see the information that writes down in the IC-card from the outside.
[0008]
On the other hand, it is still very high to use above-mentioned this exterior I C to stick into the necessity of capable latch-release.For example, as the IC-card function of radio Phone unit, under the situation of having registered service relevant and relevant service, consider the situation of losing radio Phone unit with credit card with the ticket of regularly riding, when not using radio Phone unit, wish to set locking to the IC-card function.
[0009]
But, the service of frequent use as regular by bus ticket, the operation of the latch-release trouble that just becomes.In this case, if can after simple operations, only just can unlock by exterior I C card on the cover, can be easily.
[0010]
The purpose of this invention is to provide and a kind ofly can when carrying out the IC lock function, carry out Communications Management Units, communication management method and the communication management program of the authentication or the like of IC-card by using function of keeping secret.
[0011]
To achieve these goals,, be used to manage the communication of carrying out in the noncontact mode, it is characterized in that, comprise IC, IC-card locking configuration part and master control part according to Communications Management Units of the present invention; Above-mentioned IC comprises: provide the IC-card function portion of various services and storage to be used to control the function of keeping secret configuration part of the information of the service that above-mentioned IC-card function portion provided, the setting of locking is implemented in above-mentioned IC-card locking configuration part management to the operation of above-mentioned IC-card function portion, when removing the locking of above-mentioned IC-card locking configuration part management, the security information that above-mentioned master control part sets based on above-mentioned function of keeping secret configuration part stops the service that above-mentioned IC-card function portion is provided forcibly.
[0012]
In the example in front, though the Communications Management Units that the present invention has been configured to hardware the invention is not restricted to this.The present invention also can be configured to communication management method, perhaps the communication management program of software.
[0013]
According to communication management program of the present invention, be used for the computing machine that controlling and driving is configured to Communications Management Units, wherein said Communications Management Units is used to manage the communication of carrying out in the noncontact mode, use comprises the IC of IC-card function portion and function of keeping secret configuration part, wherein above-mentioned IC-card function portion provides various services, above-mentioned function of keeping secret configuration part storage is used to control the information of the service that above-mentioned IC-card function portion provided, and the aforementioned calculation machine is carried out: the function of the operation of above-mentioned IC-card function portion being implemented locking; And when the locking of above-mentioned IC-card function portion was disengaged, the security information that sets based on above-mentioned function of keeping secret configuration part stopped the function of the service that above-mentioned IC-card function portion provided forcibly.
[0014]
According to communication management method of the present invention, be used to manage the communication of carrying out in the noncontact mode, use comprises the IC of IC-card function portion and function of keeping secret configuration part, wherein above-mentioned IC-card function portion provides various services, above-mentioned function of keeping secret configuration part storage is used to control the information of the service that above-mentioned IC-card function portion provided, when the locking of above-mentioned IC-card function portion was disengaged, the security information that sets based on above-mentioned function of keeping secret configuration part stopped the service that above-mentioned IC-card function portion is provided forcibly.
[0015]
According to the present invention, because when the lock-out state of the IC-card function portion in IC of packing into is disengaged, the security information that can set based on the function of keeping secret configuration part and forcing stops the service of above-mentioned IC-card function portion, therefore can be provided various services the anti-possible trouble that terminates in by IC-card function portion accidentally.
Description of drawings
[0061]
Fig. 1 illustrates the structural drawing of the Communications Management Units that relates to embodiments of the present invention.
Fig. 2 describes the process flow diagram of removing about the setting of the card lock of embodiments of the present invention.
Fig. 3 describes the process flow diagram about the IC-card authentication operation of embodiments of the present invention.
The explanation of Reference numeral
[0062]
1 radio Phone unit
10 IC(Faver)
11 IC-card function portions
12 read/write portions
13 FeliCa IDm storage parts
Storage part is set in the locking of 14 IC-cards
Embodiment
[0016]
Describe embodiments of the present invention with reference to the accompanying drawings in detail.
[0017]
FeliCa is a kind of non-contact IC card technology mode.The electromagnetic wave that FeliCa is sent by read/write portion is carried out the communication between read/write portion and the card.
[0018]
, be equipped with the IC-card function of FeliCa in recent radio Phone unit, it is more and more general just to become.Be incorporated with in the radio Phone unit of FeliCa, possessed by the input password and numbered the function that the various services that provided are provided.For example, the complete out of use whole lockings of the function outside the restricted function such as the ON/OFF of power supply, urgent call transmission, can not show that the mail security of mail sets or the like.By in radio Phone unit, preserving various information, improved the importance of lock function.
[0019]
By the service that the IC-card function that FeliCa possessed provides, relevant with charging is also more, and the lock function of IC-card function also becomes wherein one of important function.The IC-card lock function is realized at the power supply of IC radio Phone unit inside, that service is provided (Faver) by disconnecting.
[0020]
Up to the present, the FeliCa that provides in radio Phone unit service only is the IC-card function, but the IC that provides FeliCa service IC-card function is just not equally also supported read/write function, in radio Phone unit from now on, also may dispose read/write function.
[0021]
Therefore, use the read/write function of FeliCa, just can provide the IC-card authentication function, described IC-card authentication function is used to provide the removing function of lock function.That is to say, on the releasing picture of above-mentioned whole lockings and mail security setting, input for the password numbering, after simple operations, the exterior I C card (non-contact type IC) of login is in advance covered in the read/write portion of radio Phone unit, read/write portion with radio Phone unit reads the FeliCa IDm that exterior I C card authenticates usefulness, to carry out cross-checked, realizes latch-release.If external card, just can not removed the locking of radio Phone unit the user of radio Phone unit at one's side, if external card is the user at one's side, then in radio Phone unit, import on labour's this point that password numbers saving, be effectively function.
[0022]
But the authentication function of said external IC-card also can go wrong under the situation that is suitable for the IC-card lock function.This is because in the IC-card lock function, the power supply of Faver disconnects, and causes reading the FeliCa IDm of exterior I C card.In order to implement the IC-card authentication function, in a single day just must connect the power supply of Faver, but connect the power supply of Faver, the IC-card function will enter exercisable state automatically, and can not stop this starting state.Therefore, (to have stopped) state of IC-card function irrelevant with being in Subscriber Locked, can use the IC-card function.Be enclosed in the Faver in the radio Phone unit, because it is a lot of to have the service of charging, very big problem that Here it is.
[0023]
On the other hand, wish that IC-card lock function itself also can remove by exterior I C card function.For example, in the IC-card function of radio Phone unit, logined under the situation of the service of season ticket and credit service, consider the situation of losing radio Phone unit, want that be lock-out state to the IC-card function setting, but, the service of frequent use will feel that the operation of latch-release is pretty troublesome as the ticket of regularly riding.In this case, if can use the IC-card authentication function, then after shirtsleeve operation, only need cover to go up exterior I C card and just can unlock, easily.
[0024]
Communications Management Units according to the embodiment of the present invention by utilizing function of keeping secret, just can carry out authentication of IC-card or the like when carrying out the IC lock function.Below, illustrate that the Communications Management Units that embodiments of the present invention are relevant is encased in the example of radio Phone unit 1.
[0025]
Communications Management Units according to the embodiment of the present invention is used to manage the communication of carrying out in the noncontact mode as shown in Figure 1, is encased in the radio Phone unit 1, has IC 10, IC-card locking configuration part and control part 15.
[0026]
IC 10 is the IC that constitute with the contactless ic technological means, and it comprises IC-card function 11a of portion and function of keeping secret configuration part 11b.In addition, IC 10 has by providing electromagnetic wave to obtain read/write portion 12 by 17 information of managing of contactless ic (external card).Contactless ic (external card) 17 can be carried by the user, and this contactless ic 17 uses when IC 10 is carried out the IC-card authentication.
[0027]
The IC-card function 11a of portion provide various services.Function of keeping secret configuration part 11b preserves the information of the service be used to control the IC-card function 11a of portion, promptly forces the information that stops to serve by the IC-card function 11a of portion.Therefore, can be by opening the function of keeping secret of function of keeping secret configuration part 11b, the service of being registered on the IC-card function 11a of portion with IC (Faver) 10 operates the IC-card function 11a of portion as unregistered service.
[0028]
IC-card locking configuration part is used to manage to the setting of the operation start locking of the IC-card function 11a of portion and is used to manage setting to the operation start locking of the above-mentioned IC-card function 1b of portion, comprises that the IC-card locking sets storage part 14 and FeliCa IDm storage part 13.The IC-card locking is set storage part 14 and has been stored the information that the IC-card function 11a of portion is set at lock-out state.The above-mentioned information (locking information) that storage part 14 is stored is set in the IC-card locking, is imported by manipulation operations portion 16 by the user, under the control of master control part 15, is stored in the IC-card locking and sets in the storage part 14.
[0029]
FeliCa IDm storage part 13 be used for preserving as the target of check and inspection when IC-card authenticate, with the information of the corresponding FeliCa IDm of FeliCa IDm of contactless ic (exterior I C) 17 settings.The above-mentioned information (FeliCa IDm) that FeliCa IDm storage part 13 is write down is imported by manipulation operations portion 16 by the user, under the control of master control part 15, is stored in the FeliCa IDm storage part 13.
[0030]
Master control part 15 has increased the function of whole operations of control radio Phone unit 1, it has in IC-card locking configuration part (13,14) when unlocking, go up the security information set and forced the function that stops to serve by the IC-card function 111a of portion of IC 10 based on function of keeping secret configuration part 11b.Operating portion 16 is imported the operation information necessary of radio Phone unit 1 by the user except aforesaid operations.
[0031]
In the foregoing description, though the Communications Management Units that will be correlated with according to the embodiment of the present invention is configured to the structure of hardware, the invention is not restricted to this.The structure function of above-mentioned hardware also can make up by the performed software of computing machine.
[0032]
Next, the operation of embodiments of the present invention is described based on Fig. 1, Fig. 2 and Fig. 3.
[0033]
The situation of the operation of the IC-card function portion 11 that locks IC 10 at first, is described based on Fig. 2.
[0034]
Operating portion 16 is operated (step 201 of Fig. 2) by the user, is (the step 202 of Fig. 2 under the situation of the operation set of IC-card locking when this operation; "Yes"), when master control part 15 is received from the IC-card of operating portion 16 locking setting operation information necessary, be (the step 202 of Fig. 2 under the IC-card locking situation of opening at this IC-card locking set information; "Yes"), master control part 15 just the function of keeping secret in IC (Faver) 10 set among the storage part 11b storage security and set the information (step 203 of Fig. 2) of opening.Thus, function of keeping secret is set the information that storage part 11b has just preserved the service that is used to control the IC-card function 11a of portion.
[0035]
Under the situation of the function of keeping secret setting storage part 11b of information stores in IC (Faver) 10 that master control part 15 is opened security configuration (step 203 of Fig. 2), master control part 15 just disconnects the power supply (step 204 of Fig. 2) of IC (Faver) 10.
[0036]
Then, master control part 15 is set the information (step 205 of Fig. 2) that the locking of storage IC-card is opened among the storage part 11b to the IC-card locking.
[0037]
Next, the operation of IC-card latch-release is described based on Fig. 2.
[0038]
(step 201 of Fig. 2, step 202 when master control part 15 is received information from the IC-card latch-release of operating portion 16; "No"), master control part 15 is just connected the power supply (step 206 of Fig. 2) of IC (Faver) 10.
[0039]
Then, the function of keeping secret of master control part 15 in IC (Faver) 10 set the information (step 207 of Fig. 2) that the storage security setting is closed among the storage part 11b.In addition, master control part 15 is set the information (step 208 of Fig. 2) that the locking of storage IC-card is closed in the storage part 14 to the IC-card locking.
[0040]
As described above, when setting the information of having stored the security configuration unlatching among the storage part 11b at function of keeping secret, disconnect the power supply of IC 10, the operation of the IC-card function 11a of portion is locked.On the contrary,, connect the power supply of IC 10, just be disengaged at the locking of the operation of the IC-card function 11a of portion when setting at function of keeping secret when having stored the information that security configuration closes among the storage part 11b.
[0041]
Next, the operation of IC-card authentication is described based on Fig. 3.
[0042]
When master control part 15 is received information from the IC-card of operating portion 16 authentication beginning (step 301 of Fig. 3), master control part 15 is just set to read the storage part 14 from the IC-card locking and is locked set condition (step 302 of Fig. 3).
[0043]
If it is the information (step 302 of Fig. 3 that the IC-card locking is set that master control part 15 is set the information of reading the storage part 14 from the IC-card locking; "Yes"), then connect the power supply (step 303 of Fig. 3) of IC (Faver) 10.
[0044]
Then, master control part 15 control with the read/write portion 12 that starts IC (Faver) 10, from read/write portion 12 radiation electromagnetic waves, obtain institute's information of managing on the contactless ic (external card) 17, i.e. FeliCa IDm (step 304 of Fig. 3).
[0045]
If master control part 15 detects the FeliCa IDm (step 304 of Fig. 3 of contactless ic 17; "Yes"), just the data of detected FeliCa IDm and FeliCa IDm storage part 13 are carried out cross-checked (step 305 of Fig. 3).
[0046]
If the FeliCa IDm of contactless ic is consistent with the data of FeliCa IDm storage part 13, then master control part 15 is judged IC-card authentication success (step 306 of Fig. 3).Under the inconsistent situation of data of the FeliCa of contactless ic IDm and FeliCa IDm storage part 13, master control part 15 is judged to be IC-card authentification failure (step 307 of Fig. 3).
[0047]
If be in the IC-card locking, then master control part 15 is in the state (step 309 of Fig. 3) of disconnection with regard to the power supply that makes IC (Faver) 10.
[0048]
Under the situation of IC-card authentication success, master control part 15 judges that whether the IC-card locking is in unlatching, locks (the step 308 of Fig. 3 under the situation that is in unlatching at IC-card; "Yes"), disconnect the power supply (step 309 of Fig. 8) of IC (Faver) 10.
[0049]
Under the situation of IC-card authentification failure, master control part 15 judges that whether the IC-card locking is in unlatching, locks (the step 308 of Fig. 3 under the situation that is in unlatching at IC-card; "Yes"), then disconnect the power supply (step 309 of Fig. 8) of IC (Faver) 10.
[0050]
In addition, under master control part 15 is received from the situation of the information of the IC-card of operating portion 16 authentication beginning (step 301 of Fig. 3), not that the information (step of setting 302 of Fig. 3 is opened in the IC-card locking if set the information of reading the storage part 14 from the IC-card locking; "No"), then master control part 15 maintains disconnection with the power supply of IC (Faver) 10.
[0051]
As mentioned above, if the locking set condition of IC-card locking storage part 14 is in the setting of the locking IC-card function 11a of portion, the service that provided by the IC-card function 11a of portion just is provided based on function of keeping secret configuration part 11b institute's canned data master control part 15 forcibly so.
[0052]
As shown in Figure 3, when when making up at the control of the IC-card function 11a of portion of above-mentioned master control part 15 and IC-card authentication operation at IC 10, the locking set condition of IC-card locking storage part 14 is in the setting of the locking IC-card function 11a of portion, when unlocking by the IC card lock bonding part, master control part 15 is only to the authentication of the IC-card of IC 10 when unsuccessful, forces to stop the service that is provided by the IC-card function 11a of portion based on function of keeping secret configuration part 11b institute's canned data.
[0053]
According to the embodiment of the present invention, when the lock-out state of the IC-card function portion in being enclosed in IC is disengaged, do not start above-mentioned IC-card function portion, and be based on the security information that sets on the function of keeping secret configuration part and force to stop the service of above-mentioned IC-card function portion, therefore IC-card function portion can be provided accidentally the anti-possible trouble that terminates in of situation of various services.
[0054]
According to the embodiment of the present invention, by having made up IC-card authentication operation for IC-card, even in the locking of having removed IC, and connect power supply to IC, also only when the IC-card authentication to IC gets nowhere, just force to stop the service of IC-card function portion, therefore can prevent to carry out accidentally the leakage and the various service of stored personal information in the IC-card function portion based on the security information of setting on the function of keeping secret configuration part.
[0055]
According to the embodiment of the present invention, only when the IC-card authentication to IC gets nowhere, just do not carry out the various services of IC-card function portion, therefore under the state of the various services of not carrying out IC-card function portion, can carry out IC-card authentication IC.
[0056]
In addition, master control part 15 also can be carried out above-mentioned authentication in setting-up time.In this case, master control part 15 makes the above-mentioned authentication that surpasses above-mentioned setting-up time invalid.Like this,,, only in the shortest time of necessity, the read/write portion 12 that carries out the IC-card authentication is operated, kept higher security, thereby can realize the authentication of IC-card by setting-up time for the IC-card authentication of IC 10.
[0057]
In addition, though be applicable to that at the present invention the situation of radio Phone unit is described, and the invention is not restricted to this.The present invention equally also is applicable in the various devices that use FeliCa IC-card function and read/write function.
[0058]
More than, described the application's invention with reference to embodiment (and embodiment), but the application's invention is not restricted to above-mentioned embodiment (and embodiment).It will be understood by those skilled in the art that in the application's scope of invention, can carry out various changes the formation of the application's invention and details etc.
[0059]
The application requires the basis of the Japanese patent application No. 2007-074588 of proposition on March 22nd, 2007 as right of priority, and its disclosed full content in this combination as a reference.
The possibility of industrial use
[0060]
According to the present invention, can not carry out IC's (Faver) when not carrying out the service of IC-card function part yet IC-card authenticates, and just can enlarge the range of application of non-contact IC card technology.

Claims (16)

1, a kind of Communications Management Units of managing the communication of carrying out in the noncontact mode is characterized in that,
Have IC, IC-card locking configuration part and master control part,
The function of keeping secret configuration part that provides the IC-card of various services function portion and storage to be used to control the information of the service that above-mentioned IC-card function portion provided is provided above-mentioned IC,
Above-mentioned IC-card locking configuration part management is implemented the setting of locking to the operation of above-mentioned IC-card function portion,
When removing the locking of above-mentioned IC-card locking configuration part management, the security information that above-mentioned master control part sets based on above-mentioned function of keeping secret configuration part stops the service that above-mentioned IC-card function portion is provided forcibly.
2, the Communications Management Units of putting down in writing as claim 1, wherein,
Above-mentioned IC comprises the read/write portion that obtains institute's information of managing in non-contact type IC by the supply electromagnetic wave,
Under the state that has stopped the service that above-mentioned IC function portion provided forcibly, above-mentioned master control part is carried out the authentication carried out based on the information that above-mentioned read/write portion is obtained.
3, the Communications Management Units of putting down in writing as claim 2, wherein,
In above-mentioned authentication is under the genuine situation, and above-mentioned master control part starts above-mentioned IC-card function portion.
4, the Communications Management Units of putting down in writing as claim 2, wherein,
Above-mentioned non-contact type IC is portable.
5, the Communications Management Units of putting down in writing as claim 2, wherein,
Above-mentioned master control part is carried out above-mentioned authentication in setting-up time.
6, the Communications Management Units of putting down in writing as claim 5, wherein,
Above-mentioned master control part makes the above-mentioned authentication of having passed through above-mentioned setting-up time invalid.
7, a kind of communication management program that is used for the controlling and driving computing machine, wherein this computing machine constitutes the Communications Management Units of managing the communication of carrying out in the noncontact mode, it is characterized in that,
Use comprises the IC of IC-card function portion and function of keeping secret configuration part, and wherein above-mentioned IC-card function portion provides various services, and the storage of above-mentioned function of keeping secret configuration part is used to control the information of the service that above-mentioned IC-card function portion provided,
The aforementioned calculation machine is carried out: the function of the operation of above-mentioned IC-card function portion being implemented locking; And when the locking of above-mentioned IC-card function portion was disengaged, the security information that sets based on above-mentioned function of keeping secret configuration part stopped the function of the service that above-mentioned IC-card function portion provided forcibly.
8, the communication management program of putting down in writing as claim 7, wherein,
Adopt the described IC also comprise by the read/write portion that electromagnetic wave obtains information of managing in non-contact type IC is provided to be used as described IC,
Make the aforementioned calculation machine, under the state that the service that above-mentioned IC function portion is provided stops forcibly, carry out the authentication that the information that obtained based on above-mentioned read/write portion is carried out.
9, the communication management program of putting down in writing as claim 8, wherein,
In above-mentioned authentication is under the genuine situation, makes the aforementioned calculation machine carry out the function that starts IC-card function portion.
10, the communication management program of putting down in writing as claim 8, wherein,
Make the aforementioned calculation machine carry out the function of in setting-up time, carrying out above-mentioned authentication.
11, the communication management program of putting down in writing as claim 10, wherein,
Make the aforementioned calculation machine carry out the above-mentioned authentication that to have passed through above-mentioned setting-up time and be set at invalid function.
12, a kind of communication management method that is used to manage the communication of carrying out in the noncontact mode is characterized in that,
Use comprises the IC of IC-card function portion and function of keeping secret configuration part, and wherein above-mentioned IC-card function portion provides various services, and the storage of above-mentioned function of keeping secret configuration part is used to control the information of the service that above-mentioned IC-card function portion provided,
When the locking of above-mentioned IC-card function portion was disengaged, the security information that sets based on above-mentioned function of keeping secret configuration part stopped the service that above-mentioned IC-card function portion is provided forcibly.
13, the communication management method of putting down in writing as claim 12, wherein,
By providing electromagnetic wave to obtain information of managing in non-contact type IC from the read/write portion of packing in above-mentioned IC,
Under the state that the service that above-mentioned IC function portion is provided stops forcibly, the information that is obtained based on above-mentioned read/write portion authenticates.
14, the communication management method of putting down in writing as claim 13, wherein,
In above-mentioned authentication is under the genuine situation, starts IC-card function portion.
15, the communication management method of putting down in writing as claim 13, wherein,
In setting-up time, carry out above-mentioned authentication.
16, the communication management method of putting down in writing as claim 15, wherein,
Make the above-mentioned authentication of having passed through above-mentioned setting-up time invalid.
CN2008800090142A 2007-03-22 2008-02-28 Communication management device, communication management method, and communication management program Expired - Fee Related CN101681436B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
JP074588/2007 2007-03-22
JP2007074588A JP2008234421A (en) 2007-03-22 2007-03-22 Communications management device, communication management method, and communication management program
PCT/JP2008/053546 WO2008114594A1 (en) 2007-03-22 2008-02-28 Communication management device, communication management method, and communication management program

Publications (2)

Publication Number Publication Date
CN101681436A true CN101681436A (en) 2010-03-24
CN101681436B CN101681436B (en) 2013-04-03

Family

ID=39765704

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008800090142A Expired - Fee Related CN101681436B (en) 2007-03-22 2008-02-28 Communication management device, communication management method, and communication management program

Country Status (5)

Country Link
US (1) US8240567B2 (en)
EP (1) EP2128800A4 (en)
JP (1) JP2008234421A (en)
CN (1) CN101681436B (en)
WO (1) WO2008114594A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4879259B2 (en) * 2008-12-19 2012-02-22 株式会社エヌ・ティ・ティ・ドコモ Terminal device and application list display method
JP5249364B2 (en) * 2011-01-26 2013-07-31 Necインフロンティア株式会社 Portable electronic device, method for unlocking contactless IC, and system for unlocking contactless IC

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TR200200680T1 (en) 2000-07-17 2002-09-23 Koninklijke Philips Electronics N. V. Signal coding.
US7554383B2 (en) * 2001-03-02 2009-06-30 Sony Corporation Chip for non-contact reader/writer having power-supply management function
JP2003016398A (en) * 2001-06-27 2003-01-17 Sony Corp Portable terminal machine
JP2003328595A (en) * 2002-05-16 2003-11-19 Shinjuku Digital Media Mix Kyodo Kumiai Gravestone with built-in non-contact ic media, electronic equipment, and method of displaying information on the buried
JP2004054305A (en) 2002-07-16 2004-02-19 Sony Corp Electronic apparatus controlling method using non-contact ic card and electronic apparatus where the method is implemented
FR2865339A1 (en) * 2004-01-19 2005-07-22 Patrick Barret Personal data protecting method for e.g. portable computer, involves writing personal data in scratchpad memory of radio frequency identification tag after verifying identification of tag, while creating or modifying data
JP2005301489A (en) * 2004-04-08 2005-10-27 Fujitsu Ltd Portable terminal
DE102004047739A1 (en) * 2004-09-30 2006-02-16 Siemens Ag Identification system for proving authorization for personal use of a portable unit
JP2006113719A (en) * 2004-10-13 2006-04-27 Sharp Corp Portable electronic equipment and authentication method therefor, container for the equipment, communication system, control program and recording medium with the program recorded thereon
TWI259404B (en) * 2005-03-07 2006-08-01 Compal Electronics Inc Radio frequency identification security system and method
JP4508948B2 (en) * 2005-06-01 2010-07-21 シャープ株式会社 Mobile terminal device
US7607014B2 (en) * 2005-06-30 2009-10-20 Hewlett-Packard Development Company, L.P. Authenticating maintenance access to an electronics unit via wireless communication
JP4650683B2 (en) 2005-09-09 2011-03-16 ソニー株式会社 Image processing apparatus and method, program, and recording medium
JP2007088661A (en) * 2005-09-21 2007-04-05 Sony Corp Information processing apparatus and loop antenna
FR2895607B1 (en) * 2005-12-23 2008-05-02 Radiotelephone Sfr METHOD FOR UNLOCKING A RESOURCE BY A NON-CONTACT DEVICE
JP4915141B2 (en) * 2006-05-29 2012-04-11 富士通株式会社 Mobile terminal device
JP2008059304A (en) * 2006-08-31 2008-03-13 Sony Corp Communication device, method, and program

Also Published As

Publication number Publication date
US20100102124A1 (en) 2010-04-29
US8240567B2 (en) 2012-08-14
WO2008114594A1 (en) 2008-09-25
JP2008234421A (en) 2008-10-02
EP2128800A1 (en) 2009-12-02
CN101681436B (en) 2013-04-03
EP2128800A4 (en) 2010-04-07

Similar Documents

Publication Publication Date Title
JP5496652B2 (en) Method for ensuring secure access to a proximity communication module of a mobile terminal
EP2689614B1 (en) Method and apparatus for battery with secure element
US9633300B2 (en) Apparatus having communication means and a receiving member for a chip card
US8768300B2 (en) Remote control method and system for smart card
CN101026834A (en) Locking method and unlocking method
WO2005073843A1 (en) Secure device, terminal device, gate device, and device
EP2232905B1 (en) A method for loading credentials into a mobile communication device such as a mobile phone
CN102103765A (en) Access control and information display system, method and terminal
CN102104679A (en) Method and device for preventing mobile terminal from being used by invalid user
CN203191973U (en) Electronic device with dual systems
CN1980428B (en) Method for mobile terminal to automatically encipher and automatically protect subscriber identifying module
WO2012152079A1 (en) Mobile payment device avoiding stealing and using mobile payment card
WO2011003304A1 (en) Phone-card locking method and device for wireless communication
CN103632081A (en) Encrypted storage device and authentication system and authentication method thereof
CN101727704A (en) Handheld equipment specially used for mobile bank terminal
CN102521169B (en) Confidential USB (universal serial bus) memory disk with display screen and security control method of confidential USB memory disk
CN101681436B (en) Communication management device, communication management method, and communication management program
CN106101438A (en) A kind of cellphone information protection lock
EP1860605A1 (en) Electronic money system, information storage medium, and mobile terminal device
CN101300820A (en) Portable terminal system, portable terminal device and function locking method
CN104700020A (en) Equipment unlocking method and system
CN103390140A (en) Mobile terminal and information security control method thereof
JP2007288494A (en) Personal information self-management system, method and program of portable communication terminal such as mobile phone
CN103929525A (en) Mobile terminal, key, privacy protection system and method
US20080272187A1 (en) Electronic Money System, Information Storage Medium, and Mobile Terminal Device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: LENOVO INNOVATION CO., LTD. (HONGKONG)

Free format text: FORMER OWNER: NEC CORP.

Effective date: 20141126

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; TO: HONG KONG, CHINA

TR01 Transfer of patent right

Effective date of registration: 20141126

Address after: Hongkong, China

Patentee after: LENOVO INNOVATIONS Co.,Ltd.(HONG KONG)

Address before: Tokyo, Japan

Patentee before: NEC Corp.

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130403

Termination date: 20180228

CF01 Termination of patent right due to non-payment of annual fee